Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Turn Off Filename Extension Warning

In Leopard, Apple fixed an annoying aspect of working with the Finder in Tiger. Previously, if you changed a file's extension, the Finder prompted for confirmation. But since no one has ever accidentally changed a filename extension, Apple thankfully added an option to turn that warning off in the Leopard Finder's preferences. Choose Finder > Preferences, and in the Advanced screen, deselect Show Warning Before Changing an Extension.

 
 

Take Control News: Is Your Wireless Network Secure?

Send Article to a Friend

We've just released a new version of "Take Control of Your Wi-Fi Security," penned jointly by wireless networking guru Glenn Fleishman and Take Control publisher Adam Engst. The ebook is aimed at anyone who is running a home or small-office wireless network and who wants to set up and maintain an appropriate security level for their needs and budget. Glenn and Adam have been publishing articles and books about wireless security for ages, so this new version contains the distilled essence of years of thinking about the topic, along with fresh material to bring their discussions up to date for 2009. They have added the latest details relating to Mac OS X 10.5 Leopard, current recommendations for setting up WPA and WPS security, and steps for configuring guest networking with Apple's recently released base stations. To ensure that your wireless network is appropriately secure, pick up a copy of the $10 ebook.

Although the last update to "Take Control of Your Wi-Fi Security" came in October 2007, we're still making this version a free update for anyone who owns a previous edition of the ebook. In your existing PDF, click Check for Updates on the first page to access a download link.

"Take Control of Your Wi-Fi Security" helps you assess your real-world security risk, and aids in evaluating the likelihood of a security-related problem, the potential severity of a break-in, and the opportunity cost of securing your wireless network. It then goes on to explain the pros and cons of various security techniques, explaining how to implement the best ones to secure your network and your data in transit. It covers Mac OS X, Windows XP, and Windows Vista.

 

READERS LIKE YOU! Support TidBITS by becoming a member today!
Check out the perks at <http://tidbits.com/member_benefits.html>
Special thanks to Conor Martin, Tom Fortmann, Derek MacDonald, and
Sandro Cuccia for their generous support!